
GetCited — AI Visibility Security & Risk Analysis
wordpress.org/plugins/getcitedOptimize for AI search. The AI visibility plugin — manage crawlers, generate llms.txt, track citability.
Is GetCited — AI Visibility Safe to Use in 2026?
Generally Safe
Score 100/100GetCited — AI Visibility has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "getcited" v1.0.0 plugin exhibits a generally good security posture, with most security practices being followed correctly. The extensive use of output escaping (99%) and a high percentage of prepared statements for SQL queries (72%) are strong indicators of developer awareness regarding common web vulnerabilities. The plugin also demonstrates a commitment to security through a significant number of nonce and capability checks (26 and 30 respectively), which are crucial for preventing CSRF and unauthorized access. The absence of known CVEs and bundled libraries further contributes to its positive security profile, suggesting a well-maintained and relatively clean codebase.
However, there are a few areas that warrant attention and present potential risks. The presence of 2 unprotected entry points, specifically within the REST API routes, is a notable concern. These unprotected routes could potentially be exploited if they handle sensitive data or functionality without proper authorization checks. Additionally, the detection of a taint flow with unsanitized paths, even if not flagged as critical or high severity, indicates a potential for path traversal vulnerabilities or unintended file access if not handled with extreme caution. The single dangerous function, `preg_replace(/e)`, while potentially handled securely in context, is a known source of vulnerabilities and should always be carefully reviewed.
In conclusion, "getcited" v1.0.0 is a plugin with strong fundamental security practices, evidenced by its excellent output escaping and substantial use of authorization checks. The vulnerability history being completely clear is a very positive sign. The primary weaknesses lie in the limited but present attack surface without authentication and a single taint flow that requires careful inspection. Addressing these specific points would further enhance the plugin's security and mitigate potential risks.
Key Concerns
- REST API routes without permission callbacks
- Taint flow with unsanitized paths
- Dangerous function: preg_replace(/e)
GetCited — AI Visibility Security Vulnerabilities
GetCited — AI Visibility Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
GetCited — AI Visibility Attack Surface
AJAX Handlers 24
REST API Routes 6
WordPress Hooks 37
Scheduled Events 4
Maintenance & Trust
GetCited — AI Visibility Maintenance & Trust
Maintenance Signals
Community Trust
GetCited — AI Visibility Alternatives
LLM Bot Tracker – AI Crawler Detection & Analytics
llm-bot-tracker-by-hueston
Automatically track ChatGPT, Claude, Perplexity & 56 AI bots crawling your WordPress site. Monitor AI search engine visits, detect AI web scrapers …
GEO Pilot – AI Search Optimization & llms.txt
geo-pilot
Prepare your WordPress site for the AI Search era. Auto-generate a dynamic llms.txt file, optimize content for tokens, and rank in AI Overviews.
Better Robots.txt – AI-Ready Crawl Control & Bot Governance
better-robots-txt
Replace the default WordPress robots.txt workflow with a smarter, structured version you can preview before publishing, with Free, Pro, and Premium ed …
AI Share & Summarize
ai-share-summarize
Share on social media and generate summaries with citations from leading AIs (Claude, ChatGPT, Gemini, Grok, Perplexity, DeepSeek, Copilot, Qwen)
IA SEO Generator
ia-seo-generator
Make your site visible to AI: serve an AI-ready /llms.txt (no root). Appear in answers on ChatGPT, Perplexity, Claude, Gemini, Copilot, Comet.
GetCited — AI Visibility Developer Profile
1 plugin · 0 total installs
How We Detect GetCited — AI Visibility
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/getcited/assets/css/getcited-admin-style.css/wp-content/plugins/getcited/assets/js/getcited-admin-script.js/wp-content/plugins/getcited/assets/js/getcited-settings-script.js/wp-content/plugins/getcited/assets/js/getcited-wizard-script.js/wp-content/plugins/getcited/assets/js/getcited-admin-script.js/wp-content/plugins/getcited/assets/js/getcited-settings-script.js/wp-content/plugins/getcited/assets/js/getcited-wizard-script.jsgetcited/assets/css/getcited-admin-style.css?ver=getcited/assets/js/getcited-admin-script.js?ver=getcited/assets/js/getcited-settings-script.js?ver=getcited/assets/js/getcited-wizard-script.js?ver=HTML / DOM Fingerprints
getcited-settings-sectiongetcited-wizard-stepgetcited-llms-txt-previewgetcited-health-check-itemdata-getcited-llms-txt-contentdata-getcited-site-uuidGetCitedSettingsGetCitedAdminGetCitedWizardGetCitedSchemaDetector/wp-json/getcited/v1/settings/wp-json/getcited/v1/robots/wp-json/getcited/v1/llms-txt/wp-json/getcited/v1/health-check[getcited_llms_txt_preview][getcited_status_indicator]